$ 0 0 DescriptionThis article describes the logic of applying different access permissions and their combinations.How it works1. Restrictive rules override the allowing ones; 2. Any user account not explicitly listed in an access control list (ACL) gets blocked by default.